官术网_书友最值得收藏!

Security considerations for the functional viewpoint

Following are some of the security consideration for the functional viewpoint:

  • Security audit: To collect, store, and analyze security-related information.
  • Identity verification: In communications, it protects the integrity of communications within the IIoT system.
  • Cryptographic support: This involves software and hardware for encryption and decryption.
  • Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
  • Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
  • Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
主站蜘蛛池模板: 赤壁市| 宁国市| 庐江县| 平乡县| 新乡市| 邵阳市| 清涧县| 区。| 莎车县| 镇巴县| 乐东| 特克斯县| 南投市| 深水埗区| 东城区| 凤冈县| 英德市| 竹溪县| 松江区| 定襄县| 渭南市| 青州市| 邳州市| 伊宁市| 威远县| 靖江市| 合水县| 泸州市| 锦州市| 郑州市| 周至县| 抚顺县| 陆丰市| 西贡区| 新巴尔虎左旗| 伊宁市| 新宾| 肥城市| 岳池县| 惠州市| 比如县|